certmichelin / RedscanLinks
☆36Updated last year
Alternatives and similar repositories for Redscan
Users that are interested in Redscan are comparing it to the libraries listed below
Sorting:
- A VS Code extension to preview XML nmap output☆43Updated 11 months ago
- Tools that trigger False Positive AV alerts☆53Updated last year
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆24Updated 3 years ago
- Python tool to find vulnerable AD object and generating csv report☆14Updated 3 years ago
- Tools for offensive security of NetBackup infrastructures☆43Updated 2 years ago
- Reproducible and extensible BloodHound playbooks☆44Updated 6 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 5 years ago
- ☆54Updated 4 years ago
- C# and Impacket implementation (here with Kerberos auth support) of PrintNightmare CVE-2021-1675/CVE-2021-34527☆29Updated 4 years ago
- Continuous kerberoast monitor☆45Updated 2 years ago
- C# User Simulation☆33Updated 3 years ago
- Ingest openldap data into bloodhound☆81Updated 4 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 3 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆51Updated 3 years ago
- Anonymize your hashcat formatted files for online cracking☆31Updated last year
- ☆108Updated 4 years ago
- Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files☆31Updated 3 years ago
- Exploits made practicing for OSCE☆23Updated 5 years ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Updated 4 years ago
- Bloodhound Portable for Windows☆53Updated 2 years ago
- Posts about different topics☆39Updated 5 months ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆42Updated 5 months ago
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Updated 4 years ago
- Files to automatically deploy red team Active Directory test lab☆48Updated 3 years ago
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.☆57Updated last year
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Updated last year
- ☆18Updated 2 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆44Updated last year
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Updated 4 years ago
- Locate intersting files in grayhatwarfare.com open S3 buckets and Azure blobs automatically!☆29Updated 3 years ago